全文获取类型
收费全文 | 151篇 |
免费 | 22篇 |
国内免费 | 12篇 |
出版年
2024年 | 2篇 |
2023年 | 1篇 |
2021年 | 9篇 |
2020年 | 9篇 |
2019年 | 6篇 |
2018年 | 8篇 |
2017年 | 8篇 |
2016年 | 5篇 |
2015年 | 4篇 |
2014年 | 11篇 |
2013年 | 24篇 |
2012年 | 3篇 |
2011年 | 8篇 |
2010年 | 13篇 |
2009年 | 6篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 7篇 |
2002年 | 2篇 |
2001年 | 6篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1988年 | 1篇 |
排序方式: 共有185条查询结果,搜索用时 15 毫秒
41.
42.
43.
44.
马德辉 《中国人民武装警察部队学院学报》2007,23(3):38-42
通过文献和网络调查等方法,对英国警务情报教育培训机制、课程设置等内容进行了介绍和解析,力求通过研究英国警务情报教育培训的现状,为我国新兴的警务情报教育提供可资借鉴的内容和方法。 相似文献
45.
分析了电子设备和武器装备的BIT系统虚警形式之一——瞬态虚警的产生原因和一般的预防措施;提出运用灰色关联度和模糊贴近度对瞬态虚警进行辨识并给出了这两种方法的基本原理;分别采用数值模拟和物理模拟的手段,获得了具有温度、湿度、振动(电源)三环境参数系统的状态变化样本群,以及因振动(电源)参数突变而产生的瞬态虚警样本;运用灰色关联度和模糊贴近度方法识别虚警及产生虚警的环境因素,结果表明两种方法可以胜任要求。 相似文献
46.
This article examines British deception operations in the early Cold War. It illustrates how, in the years before Britain could threaten atomic retaliation, Britain’s deception organisation, the London Controlling Section (LCS) was tasked with conducting operations to deter the USSR and China from starting a war or threatening British interests. It introduces a number of their ploys – some physical and military, others subversive and political. It argues that the LCS faced significant challenges in implementing its deceptions. Repeating the great strategic successes of the Second World War was extremely difficult; what remained for the Cold War were more limited deceptions. 相似文献
47.
传统加油模式使操作人员易受有毒易燃油气的侵害,而且严冬酷暑时加油站作业环境恶劣,因此在加油站配置机器人实现智能化加油变得十分迫切。介绍了国内外汽车加油机器人的研究进展,指出其作业对象的差异性、环境的多变性以及作业过程的危险性。分析了当前汽车加油机器人所采用的加油机构、加注接口以及识别与定位技术的特点,指出加油机构优化、安全控制、智能识别与定位研究是汽车加油机器人发展的方向。 相似文献
48.
认知电子战通常被定义为以具备认知性能的电子战装备为基础,注重自主交互式的电磁环境学习能力与动态智能化的对抗任务处理能力的电子战形态。自其被首次提出以来,以其感知准、推理强、决策快的优势备受国内外研究学者广泛关注。随着人工智能新理念、新技术、新应用的不断涌现,认知电子战步入崭新的发展阶段。为捕捉其未来发展方向,从人工智能角度出发,总结并丰富了认知电子战概念内涵,梳理认知电子战的发展脉络及外国典型项目,搭建认知电子战系统框架及架构,从感知、判断、决策等方面对认知听电子战关键技术进行了全面系统综述,并总结了认知电子战面临的挑战和发展趋势。 相似文献
49.
Stefano Musco 《Defense & Security Analysis》2017,33(4):380-394
The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations. 相似文献
50.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献